default search action
Kehinde O. Babaagba
Person information
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c12]Kehinde O. Babaagba, Ritwik Murali, Sarah Thomson:
Exploring the use of fitness landscape analysis for understanding malware evolution. GECCO Companion 2024: 77-78 - 2023
- [c11]Ahsen Tahir, Zhiyuan Tan, Kehinde O. Babaagba:
Can Federated Models Be Rectified Through Learning Negative Gradients? BDTA 2023: 18-32 - [c10]Ayodeji Oke, Kehinde O. Babaagba:
Image Forgery Detection Using Cryptography and Deep Learning. BDTA 2023: 62-78 - [c9]Kehinde O. Babaagba, Mayowa Ayodele:
Evolutionary Based Transfer Learning Approach to Improving Classification of Metamorphic Malware. EvoApplications@EvoStar 2023: 161-176 - [c8]Kehinde O. Babaagba, Jordan Wylie:
An Evolutionary based Generative Adversarial Network Inspired Approach to Defeating Metamorphic Malware. GECCO Companion 2023: 1753-1759 - [c7]Luis Romero Gomez, Tess Watt, Kehinde O. Babaagba, Christos Chrysoulas, Aydin E. Homay, Raghuraman Rangarajan, Xiaodong Liu:
Emotion Recognition on Social Media Using Natural Language Processing (NLP) Techniques. ICISS 2023: 113-118 - [c6]Aidan Spalding, Zhiyuan Tan, Kehinde O. Babaagba:
Challenges and Considerations in Data Recovery from Solid State Media: A Comparative Analysis with Traditional Devices. TrustCom 2023: 1751-1756 - 2022
- [j1]Fangwei Wang, Shaojie Yang, Changguang Wang, Qingru Li, Kehinde O. Babaagba, Zhiyuan Tan:
Toward machine intelligence that learns to fingerprint polymorphic worms in IoT. Int. J. Intell. Syst. 37(10): 7058-7078 (2022) - [c5]Leigh Turnbull, Zhiyuan Tan, Kehinde O. Babaagba:
A Generative Neural Network for Enhancing Android Metamorphic Malware Detection based on Behaviour Profiling. DSC 2022: 1-9 - [c4]Ross A. J. McLaren, Kehinde O. Babaagba, Zhiyuan Tan:
A Generative Adversarial Network Based Approach to Malware Generation Based on Behavioural Graphs. LOD (2) 2022: 32-46 - [e1]Juan Luis Jiménez Laredo, José Ignacio Hidalgo, Kehinde O. Babaagba:
Applications of Evolutionary Computation - 25th European Conference, EvoApplications 2022, Held as Part of EvoStar 2022, Madrid, Spain, April 20-22, 2022, Proceedings. Lecture Notes in Computer Science 13224, Springer 2022, ISBN 978-3-031-02461-0 [contents] - 2021
- [b1]Kehinde O. Babaagba:
Application of evolutionary machine learning in metamorphic malware analysis and detection. Edinburgh Napier University, UK, 2021 - 2020
- [c3]Kehinde O. Babaagba, Zhiyuan Tan, Emma Hart:
Improving Classification of Metamorphic Malware by Augmenting Training Data with a Diverse Set of Evolved Mutant Samples. CEC 2020: 1-7 - [c2]Kehinde O. Babaagba, Zhiyuan Tan, Emma Hart:
Automatic Generation of Adversarial Metamorphic Malware Using MAP-Elites. EvoApplications 2020: 117-132
2010 – 2019
- 2019
- [c1]Kehinde O. Babaagba, Zhiyuan Tan, Emma Hart:
Nowhere Metamorphic Malware Can Hide - A Biological Evolution Inspired Detection Scheme. DependSys 2019: 369-382
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-11-15 20:42 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint